Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Monday May 05 2014, @04:18PM   Printer-friendly
from the back-to-the-postit-under-the-keyboard dept.

An Ars Technica article entitled "Pavlovian password management" aims to change sloppy habits. Policy would reward or penalize people based on the passwords they pick.

For more than a decade, the virtues of strong passwords have been lost on most end users, despite frequent sermons from security experts and IT administrators over their importance in locking down accounts. Now, a consultant is proposing a system that provides rewards or penalties based on the passcode choices people make. For instance, a user who picks test123@# might be required to change the password in three days under the system proposed by Lance James, the head of the cyber intelligence group at Deloitte & Touche. The three-day limit is based on calculations showing it would take about 4.5 days to find the password using offline cracking techniques. Had the same user chosen t3st123@##$x , the system wouldn't require a change for three months.

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Insightful) by LegendaryTeeth on Monday May 05 2014, @06:00PM

    by LegendaryTeeth (2431) on Monday May 05 2014, @06:00PM (#39877)

    They are saying if someone stole the database of passwords, it would take 4.5 days to crack that password. So if you stealthily nabbed it, 4.5 days later you come back and successfully authenticate with the real account login interface on the first try. No chance for account lockouts.

    Starting Score:    1  point
    Moderation   +2  
       Insightful=1, Interesting=1, Total=2
    Extra 'Insightful' Modifier   0  

    Total Score:   3  
  • (Score: 2) by JeanCroix on Monday May 05 2014, @06:20PM

    by JeanCroix (573) on Monday May 05 2014, @06:20PM (#39885)
    Honest question: a database is not cracked all at once? The more complex passwords take longer to crack?
    • (Score: 3, Interesting) by SuddenOutbreak on Monday May 05 2014, @06:28PM

      by SuddenOutbreak (3961) on Monday May 05 2014, @06:28PM (#39889)

      Honest question: a database is not cracked all at once? The more complex passwords take longer to crack?

      Yes, this is pretty much it. I had a friend who was given an old laptop on leaving her old job. It was given with NO support and had multiple XP logins, only two of them having admin rights.

      I downloaded "Ophcrack" onto a USB drive and turned it loose. In under one minute it had dug out the passwords which were simple words (mixed-case), and within two it had dug out an admin password of mixed-case plus numbers. One password had remained uncracked, but I had only downloaded the "smaller" 400MB table file. Had I gone for the 7.5GB table file, I could have gotten all of them.

      The limiting speed factor (for the XP 'rainbow tables' crack, anyway) is how much fits in RAM.

  • (Score: 3, Insightful) by snick on Monday May 05 2014, @07:38PM

    by snick (1408) on Monday May 05 2014, @07:38PM (#39913)

    So .. instead of taking responsibility to protect the store of password hashes, security experts and IT administrators want to sneer at (l)users who can't remember askl;jfdls;kdjf;lskdjfl2kj423kl4j23klj4
    Here's an idea: "security experts" should pull their heads out of their asses and come up with tools and practices to prevent offline attacks.

    • (Score: 1) by e_armadillo on Monday May 05 2014, @08:20PM

      by e_armadillo (3695) on Monday May 05 2014, @08:20PM (#39925)

      Yeah, that was what I was thinking. It seemed to me that it was *more* of a problem that the password database could be hijacked.

      --
      "How are we gonna get out of here?" ... "We'll dig our way out!" ... "No, no, dig UP stupid!"
      • (Score: 2, Informative) by SecurityGuy on Tuesday May 06 2014, @02:34AM

        by SecurityGuy (1453) on Tuesday May 06 2014, @02:34AM (#40003)

        They're both problems. There have historically been vulnerabilities in systems that were not sufficient to give you a login, but were sufficient to get you the contents of files. Use that to get a copy of /etc/shadow or its equivalent and throw it at your favorite password cracker. There were/are also directory services like NIS that happily send password hashes unencrypted over the wire. A sniffer and some time is all you needed to get password hashes.

        The bottom line is that by design or fault, password hashes get exposed. Making them hard to crack is just part of a reasonable defense in depth strategy. The problem is that passwords that are sufficiently hard to crack are becoming hard to remember because processing power has increased so much.

    • (Score: 1) by LegendaryTeeth on Tuesday May 06 2014, @03:05PM

      by LegendaryTeeth (2431) on Tuesday May 06 2014, @03:05PM (#40167)

      It's not so much that as that your security is only as strong as the weakest link in the chain. It's the same reason you need to save your passwords as salted hashes and not just plaintext. Sure, you do what you can to prevent anyone from stealing the database, but you need mitigate the damage in case they do.